CN103902453A - Embedded equipment security detection method based on components - Google Patents

Embedded equipment security detection method based on components Download PDF

Info

Publication number
CN103902453A
CN103902453A CN201410132944.4A CN201410132944A CN103902453A CN 103902453 A CN103902453 A CN 103902453A CN 201410132944 A CN201410132944 A CN 201410132944A CN 103902453 A CN103902453 A CN 103902453A
Authority
CN
China
Prior art keywords
detection components
package base
pedestal
detection
detecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410132944.4A
Other languages
Chinese (zh)
Other versions
CN103902453B (en
Inventor
张之刚
吕卓
张威
马彩霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Henan Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Electric Power Research Institute of State Grid Henan Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201410132944.4A priority Critical patent/CN103902453B/en
Publication of CN103902453A publication Critical patent/CN103902453A/en
Application granted granted Critical
Publication of CN103902453B publication Critical patent/CN103902453B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an embedded equipment security detection method based on components. The method has the advantages that by the design based on the components, a detecting system has better extensibility and compatibility, each detecting tool and each detecting item can be made into components, and extension is facilitated; by the standard SOAP bus communication manner based on cross-platform, the system can be in butt joint with the components of tools of different languages and different platforms; by integrating different detecting components, a uniform detecting inlet platform is provided for detecting staff, and detecting flow control and data analysis of the detecting staff are facilitated; the detecting components are authenticated through digital certificates and digital signatures, accessing of illegal components can be prevented, credibility of detecting process and detecting results is guaranteed, and the detecting results are protected by digital signatures to prevent the detecting results from being tampered.

Description

A kind of embedded device safety detection method based on componentization
Technical field
The invention belongs to computer information safe technical field of measurement and test, relate to the embedded device safety detection method based on componentization.
Background technology
Embedded system is the dedicated computer system designing for application-specific, its application is very extensive, in the system such as Internet of things system, intelligent grid all a large amount of employing embedded system, can say, embedded system has been deep into the various aspects of people's daily life.
With respect to traditional PC equipment, the problems such as the suitability of hardware that what embedded system was mainly considered is, resource occupation still less, the function of safety protection of a lot of embedded systems seldom or does not almost have, malicious attacker is easy to invade in system, and malicious attacker can implement to disturb, monitor even Long-distance Control to embedded system according to the demand of malicious attacker.In electric system etc. is important, embedded system is in occupation of greatly, once it is attacked, the regular traffic work of the system paralysis even that just can be affected, therefore, must pay attention to and solve the safety problem of embedded system.
It is the important leverage of embedded system security that embedded system security detects, and safety detection not only can be found safety problem, can also provide foundation for relevant embedded product strengthens safely.
But although current in areas of information technology, the development& testing that is directed to computing machine embedded system has very many practices, substantially all respectively becomes one.Every kind of product is due to the difference of physical structure, type of hardware, bottom layer driving, and its measuring technology all can only be confined to developed same model product.Change a kind of product, even of the same type, producer is different, and measuring technology used, testing tool and platform are all different.Therefore, at present architectonical, can be general embedded testing technology with respect to the test of software and hardware in conventional information technical field, also very immature.
Therefore, be directed to the safety detection of embedded system, in order to adapt to different detection techniques, instrument and system architecture, be necessary to build that compatibility is good, the detection platform of easy expansion, the demand detecting to meet embedded system security.
Summary of the invention
The object of this invention is to provide a kind of embedded device safety detection method based on componentization, can be integrated and the different detection components of management, for testing staff provides convenience and effectively supports the safety detection of embedded system.
The present invention adopts following technical proposals:
An embedded device safety detection method based on componentization, comprises following step:
A, first carry out safety detecting system initialization, utilize package base to generate the pedestal digital certificate and the pedestal private key that use for digital signature, pedestal private key utilizes keeper's password to be encrypted storage;
B, each detection components need to register to package base before using for the first time; The concrete steps of registration are as follows: first detection components connecting communication bus, secondly version number, the digital digest value of detection components executable file and the description document of contract-defined interface of detection components are provided to package base, last component pedestal carries out Correctness checking to contract-defined interface, if checked unsuccessfully, registration failure; If check successfully, succeed in registration; After succeeding in registration, package base is put into the description document of contract-defined interface in contract-defined interface storehouse;
The digital digest that C, pedestal private key provide detection components carries out digital signature, and this digital signature and pedestal digital certificate are returned to detection components, and detection components is all preserved each digital signature and pedestal digital certificate;
D, start detection assembly, detection components is connected with package base, detection components sends digital digest value and the pedestal digital signature of detection components to package base, package base checks whether this digest value was registered in system: if the description document of contract-defined interface is imperfect or form is wrong, return to registration failure; If the description document of contract-defined interface is complete or form does not have mistake, succeed in registration; Package base and detection components are directly carried out communication UNICOM;
After E, communication UNICOM, detection components is submitted digital signature to, and whether package base utilizes pedestal credentials check digital signature legal, if legal, package base and detection components connect, and is connected with this detection components communication otherwise disconnect;
F, testing staff describe the detected parameters of this detection components of document configuration according to interface contract, and send to detection components by package base and communication bus;
G, testing staff initiate test instruction to package base, and package base utilizes communication bus to test to detection components, and detection components sends testing result and log information to package base after detecting;
H, package base check result and log information, utilize pedestal private key to carry out digital signature to ensure testing result integrality to the result detecting, and then testing result put in database.
Described safety detecting system comprises multiple detection components, for the package base that detection components is managed and the supervisor console that system is managed and controlled, each detection components all has corresponding contract-defined interface description document; Also comprise the communication bus communicating for detection of between assembly and package base, and the database of using for store test data, described multiple detection components are connected with package base by communication bus respectively, and described package base is connected with database by supervisor console.
Described each detection components must be registered on pedestal, and provide corresponding contract-defined interface, the contract-defined interface that package base utilizes detection components to provide, can manage and control the operation of certain detection components, and can obtain test result and log information.
The described communication bus communicating for detection of assembly and package base communicates by the SOAP interface of the standard based on XML, supports affairs and session.
Described supervisor console is mainly made up of user role administration module, test item and case management module, testing result administration module, statistics and log pattern; Tester can manage work to whole embedded-type security detection platform, and tester sets up test event, writes test case, records testing result, carries out log recording and statistical study.
The description document of described contract-defined interface comprises assembly Back ground Information, address, configuration parameter information, steering order data layout and examining report descriptor.
In described step H, package base check result and log information comprise that whether package base checking testing result is complete and whether its form is effective.
Described database is MySql database, and it can provide the memory function that detects data.
Described database is Oralce database, for being suitable for the more situation of test event.
The digital certificate of pedestal described in steps A and pedestal private key adopt RSA public key algorithm to realize, and key length is not less than 2048; Described pedestal private key adopts administrator password's encryption method, be specially: first utilize SHA1 digital digest algorithm to carry out computing to administrator password, get front 16 bytes of result of calculation as key, utilize aes algorithm to be encrypted this pedestal private key, obtain the pedestal private key ciphertext after encrypting, in the time using private key, utilize aes algorithm to the close file decryption of pedestal private key.
The present invention is based on the design of componentization, make detection system there is better extendability and compatibility, each testing tool and test item can be made to assembly, convenient expansion; By the SOAP bus communication mode based on cross-platform of standard, system can be connected with the assembly of different language, different platform instrument simultaneously; Further by integrated different detection components, for testing staff provides a unified detection terrace at entrance, testing staff not only can carry out unified management to test item, use-case, can also unify detection components data layout and detect use-pattern, facilitating the control of testing staff to testing process and the analysis of data.The present invention further authenticates detection components by digital certificate and digital signature technology; prevent the access of illegal assembly; guarantee the credibility of testing process and result, utilize digital signature to protect testing result simultaneously, guaranteed that testing result can be by people for not distorting.
Brief description of the drawings
Fig. 1 is system architecture diagram of the present invention;
Fig. 2 is process flow diagram of the present invention.
Embodiment
As shown in Figure 2, a kind of embedded device safety detection method based on componentization, is characterized in that: comprise following step:
A, first carry out safety detecting system initialization, utilize package base to generate the pedestal digital certificate and the pedestal private key that use for digital signature, pedestal private key utilizes keeper's password to be encrypted storage; Described pedestal digital certificate and pedestal private key adopt
Figure 2014101329444100002DEST_PATH_IMAGE001
public key algorithm is realized, and key length is not less than
Figure 308555DEST_PATH_IMAGE002
position; Described pedestal private key adopts administrator password's encryption method, is specially: first utilize
Figure 2014101329444100002DEST_PATH_IMAGE003
digital digest algorithm carries out computing to administrator password, get result of calculation before
Figure 714391DEST_PATH_IMAGE004
byte, as key, is utilized
Figure 2014101329444100002DEST_PATH_IMAGE005
algorithm is encrypted this pedestal private key, obtains the pedestal private key ciphertext after encrypting, and in the time using private key, utilizes
Figure 984967DEST_PATH_IMAGE005
algorithm is to the close file decryption of pedestal private key.
B, each detection components need to register to package base before using for the first time; The concrete steps of registration are as follows: first detection components connecting communication bus, secondly version number, the digital digest value of detection components executable file and the description document of contract-defined interface of detection components are provided to package base, last component pedestal carries out Correctness checking to contract-defined interface, if checked unsuccessfully, registration failure; If check successfully, succeed in registration; After succeeding in registration, package base is put into the description document of contract-defined interface in contract-defined interface storehouse; In the time detecting the validity of description document of contract-defined interface: whether first need to detect it is an XML document, then analyzing XML file check whether it meets module requirement, the parsing of XML document herein adopts DOM mode to realize.
The digital digest that C, pedestal private key provide detection components carries out digital signature, and this digital signature and pedestal digital certificate are returned to detection components, and detection components is all preserved each digital signature and pedestal digital certificate; Described digital signature method is as follows: adopt RSA PKCS1 mode to treat signature numeral and fill, then utilize pedestal private key to adopt RSA personal key algorithm to be encrypted the result after filling, this encrypted result is digital signature value.
D, start detection assembly, detection components is connected with detection components, detection components sends digital digest value and the pedestal digital signature of detection components to package base, package base checks whether this digest value was registered in system, if the description document of contract-defined interface is imperfect or form is wrong, return to registration failure; If succeeded in registration, package base should be tested and detection components Direct Communication UNICOM; When described digital signature checked legitimacy, first utilize pedestal certificate to adopt RSA PKI decipherment algorithm to be decrypted digital signature value, then remove its PKCS1 and fill.
After E, communication UNICOM, detection components is submitted digital signature to, and whether package base utilizes pedestal credentials check digital signature legal, if legal, package base and detection components connect, and is connected with this detection components communication if do not conform to rule disconnection;
F, testing staff describe the detected parameters of this detection components of document configuration according to interface contract, and send to detection components by package base and communication bus;
G, testing staff initiate test instruction to package base, and package base utilizes communication bus to test to detection components, and detection components sends testing result and log information to package base after detecting;
H, package base check result and log information, utilize pedestal private key to carry out digital signature to ensure testing result integrality to the result detecting, and then testing result put in database.
Described safety detecting system comprises multiple detection components, for the package base that detection components is managed and the supervisor console that system is managed and controlled, each detection components tool all has corresponding contract-defined interface, also comprise the communication bus communicating for detection of between assembly and package base, and the database of using for store test data, described multiple detection components are connected with package base by communication bus respectively, and described package base is connected with database by supervisor console.
As shown in Figure 1, for detection of the package base of assembly management, it is mainly by component register module, assembly operating control module, three, contract-defined interface storehouse module composition, component register module is for detection of component register and examination, assembly operating control module is for detection of component detection parameter configuration, the core works such as testing process control and testing result collection, contract-defined interface storehouse is the description document depository of a contract-defined interface, in real time for each detection components is analyzed a file with detection components ID name, in each file, store the information such as description document and relevant configuration of contract-defined interface.Described each detection components must be registered on pedestal, and provide corresponding contract-defined interface, the contract-defined interface that package base utilizes detection components to provide, can manage and control the operation of certain detection components, and can obtain the information such as test result and daily record;
The described communication bus communicating for detection of assembly and package base communicates by the SOAP interface of the standard based on XML, in each communication data packets, all comprise a session identification, be used for carrying out transaction operation and session control, session timeout mechanism is also provided simultaneously, in the time that assembly does not have communication for a long time, session stops automatically, discharges this Session Resources.
Described based on supervisor console, tester can manage work to whole embedded-type security detection platform, and tester can set up test event, writes test case, records testing result, carry out log recording and statistical study etc.; Supervisor console is mainly made up of user role administration module, test item and case management module, testing result administration module and statistics and log pattern.User role administration module adopts the way to manage based on role to realize, and for every user assignment, one or more roles carry out control of authority, and basic role is divided into system manager, detection person, auditor etc.; Test item and case management module manage whole testing process, need model project before detection, and then typing detects use-case, the Back ground Informations such as each detection use-case inclusion test content, priority, state, time, remarks, responsible person; Testing result administration module is unified to collect and record to the result of artificial and component detection, and supports statistics and query function, facilitates the evaluation of testing staff to whole detection effect by generating statistical report form; Statistics is mainly carried out record to critical event in system and testing process with log pattern, is convenient to auditor audits by statistical.
The description document of described contract-defined interface is provided by detection components developer, it has described the form of package base and the transmitting-receiving of detection components Interworking Data, and the document main contents comprise: assembly Back ground Information, address, configuration parameter information, steering order data layout, examining report descriptor; The digital digest value of described detection components executable file, adopts SHA1 digital digest algorithm to carry out digital digest computing to executable file and completes.
In described step H, package base check result and log information comprise that whether package base checking testing result is complete and whether its form is effective.
The present invention is based on the design of componentization, make detection system there is better extendability and compatibility, each testing tool and test item can be made to assembly, facilitate expansion, by the SOAP bus communication mode based on cross-platform of standard, system can be connected with the assembly of different language, different platform instrument simultaneously; Further by integrated different detection components, for testing staff provides a unified detection terrace at entrance, testing staff not only can carry out unified management to test item, use-case, can also unify detection components data layout and detect use-pattern, facilitating the control of testing staff to testing process and the analysis of data.The present invention further authenticates detection components by digital certificate and digital signature technology; prevent the access of illegal assembly; guarantee the credibility of testing process and result, utilize digital signature to protect testing result simultaneously, guaranteed that testing result can be by people for not distorting.

Claims (10)

1. the embedded device safety detection method based on componentization, is characterized in that: comprise following step:
A, first carry out safety detecting system initialization, utilize package base to generate the pedestal digital certificate and the pedestal private key that use for digital signature, pedestal private key utilizes keeper's password to be encrypted storage;
B, each detection components need to register to package base before using for the first time; The concrete steps of registration are as follows: first detection components connecting communication bus, secondly version number, the digital digest value of detection components executable file and the description document of contract-defined interface of detection components are provided to package base, last component pedestal carries out Correctness checking to contract-defined interface, if checked unsuccessfully, registration failure; If check successfully, succeed in registration; After succeeding in registration, package base is put into the description document of contract-defined interface in contract-defined interface storehouse;
The digital digest that C, pedestal private key provide detection components carries out digital signature, and this digital signature and pedestal digital certificate are returned to detection components, and detection components is all preserved each digital signature and pedestal digital certificate;
D, start detection assembly, detection components is connected with package base, detection components sends digital digest value and the pedestal digital signature of detection components to package base, package base checks whether this digest value was registered in system: if the description document of contract-defined interface is imperfect or form is wrong, return to registration failure; If the description document of contract-defined interface is complete or form does not have mistake, succeed in registration; Package base and detection components are directly carried out communication UNICOM;
After E, communication UNICOM, detection components is submitted digital signature to, and whether package base utilizes pedestal credentials check digital signature legal, if legal, package base and detection components connect, and is connected with this detection components communication otherwise disconnect;
F, testing staff describe the detected parameters of this detection components of document configuration according to interface contract, and send to detection components by package base and communication bus;
G, testing staff initiate test instruction to package base, and package base utilizes communication bus to test to detection components, and detection components sends testing result and log information to package base after detecting;
H, package base check result and log information, utilize pedestal private key to carry out digital signature to ensure testing result integrality to the result detecting, and then testing result put in database.
2. the embedded device safety detection method based on componentization according to claim 1, it is characterized in that: described safety detecting system comprises multiple detection components, for the package base that detection components is managed and the supervisor console that system is managed and controlled, each detection components all has corresponding contract-defined interface description document; Also comprise the communication bus communicating for detection of between assembly and package base, and the database of using for store test data, described multiple detection components are connected with package base by communication bus respectively, and described package base is connected with database by supervisor console.
3. the embedded device safety detection method based on componentization according to claim 2, it is characterized in that: described each detection components must be registered on pedestal, and provide corresponding contract-defined interface, the contract-defined interface that package base utilizes detection components to provide, can the operation of certain detection components be managed and be controlled, and can obtain test result and log information.
4. the embedded device safety detection method based on componentization according to claim 3, it is characterized in that: the described communication bus communicating for detection of assembly and package base communicates by the SOAP interface of the standard based on XML, supports affairs and session.
5. the embedded device safety detection method based on componentization according to claim 4, is characterized in that: described supervisor console is mainly made up of user role administration module, test item and case management module, testing result administration module, statistics and log pattern; Tester can manage work to whole embedded-type security detection platform, and tester sets up test event, writes test case, records testing result, carries out log recording and statistical study.
6. the embedded device safety detection method based on componentization according to claim 5, is characterized in that: the description document of described contract-defined interface comprises assembly Back ground Information, address, configuration parameter information, steering order data layout and examining report descriptor.
7. the embedded device safety detection method based on componentization according to claim 6, is characterized in that: in described step H, package base check result and log information comprise that whether package base checking testing result is complete and whether its form is effective.
8. the embedded device safety detection method based on componentization according to claim 7, is characterized in that: described database is MySql database, and it can provide the memory function that detects data.
9. the embedded device safety detection method based on componentization according to claim 7, is characterized in that: described database is Oralce database, for being suitable for the more situation of test event.
10. the embedded device safety detection method based on componentization according to claim 8 or claim 9, is characterized in that: the digital certificate of pedestal described in steps A and pedestal private key adopt RSA public key algorithm to realize, and key length is not less than 2048; Described pedestal private key adopts administrator password's encryption method, be specially: first utilize SHA1 digital digest algorithm to carry out computing to administrator password, get front 16 bytes of result of calculation as key, utilize aes algorithm to be encrypted this pedestal private key, obtain the pedestal private key ciphertext after encrypting, in the time using private key, utilize aes algorithm to the close file decryption of pedestal private key.
CN201410132944.4A 2014-04-03 2014-04-03 A kind of embedded device safety detection method of Component-Based Development Active CN103902453B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410132944.4A CN103902453B (en) 2014-04-03 2014-04-03 A kind of embedded device safety detection method of Component-Based Development

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410132944.4A CN103902453B (en) 2014-04-03 2014-04-03 A kind of embedded device safety detection method of Component-Based Development

Publications (2)

Publication Number Publication Date
CN103902453A true CN103902453A (en) 2014-07-02
CN103902453B CN103902453B (en) 2016-07-13

Family

ID=50993788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410132944.4A Active CN103902453B (en) 2014-04-03 2014-04-03 A kind of embedded device safety detection method of Component-Based Development

Country Status (1)

Country Link
CN (1) CN103902453B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977311A (en) * 2017-11-15 2018-05-01 中国电力科学研究院有限公司 A kind of automatic method and system for carrying out distribution terminal information security detection
CN108804882A (en) * 2018-06-11 2018-11-13 北京北信源信息安全技术有限公司 A kind of copyrighted software detection process method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6453417B1 (en) * 1993-05-12 2002-09-17 Usar Systems, Inc. Microcontroller with secure signature extraction
CN102799819A (en) * 2012-07-04 2012-11-28 北京京航计算通讯研究所 Embedded software safety protection system
CN103544660A (en) * 2013-10-30 2014-01-29 国家电网公司 Method for safety testing before online implementation of electric power information system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6453417B1 (en) * 1993-05-12 2002-09-17 Usar Systems, Inc. Microcontroller with secure signature extraction
CN102799819A (en) * 2012-07-04 2012-11-28 北京京航计算通讯研究所 Embedded software safety protection system
CN103544660A (en) * 2013-10-30 2014-01-29 国家电网公司 Method for safety testing before online implementation of electric power information system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张威等: "电网智能终端中嵌入式软件系统的测试", 《重庆理工大学学报(自然科学)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107977311A (en) * 2017-11-15 2018-05-01 中国电力科学研究院有限公司 A kind of automatic method and system for carrying out distribution terminal information security detection
CN108804882A (en) * 2018-06-11 2018-11-13 北京北信源信息安全技术有限公司 A kind of copyrighted software detection process method and system

Also Published As

Publication number Publication date
CN103902453B (en) 2016-07-13

Similar Documents

Publication Publication Date Title
CN103577748B (en) Dynamic measuring method based on dependable computing and management system
CN101834860B (en) Method for remote dynamic verification on integrality of client software
CN106687980B (en) Management program and virtual machine protection
CN112217835B (en) Message data processing method and device, server and terminal equipment
Gul et al. Cloud computing security auditing
CN103038745A (en) Extending an integrity measurement
CN101977183B (en) High reliable digital content service method applicable to multiclass terminal equipment
CN105099705B (en) A kind of safety communicating method and its system based on usb protocol
CN101739622A (en) Trusted payment computer system
CN109828924A (en) Test method, device and calculating equipment and medium
WO2018162060A1 (en) Methods and devices for attesting an integrity of a virtual machine
CN106603488A (en) Safety system based on power grid statistical data searching method
CN109309645A (en) A kind of software distribution security guard method
CN107133512A (en) POS terminal control method and device
CN104506480A (en) Cross-domain access control method and system based on marking and auditing combination
US9692641B2 (en) Network connecting method and electronic device
CN103902453B (en) A kind of embedded device safety detection method of Component-Based Development
CN105404796A (en) JavaScript source file protection method and apparatus
CN102571810B (en) Dynamic password authentication method based on hardware digital certificate carrier and dynamic password authentication system thereof
CN116074843B (en) Zero trust security trusted audit method for 5G dual-domain private network
CN105790935A (en) Independent-software-and-hardware-technology-based trusted authentication server
CN102592101A (en) Method and system for protecting LED display management software safety
CN108171078A (en) A kind of data security method and device towards third-party cloud platform evaluation system
CN101739623A (en) Trusted payment computer system
Ochani et al. Security issues in cloud computing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant